Quantifying Information Exposure in Internet Routing

06/26/2019
by   Peter Mell, et al.
0

Data sent over the Internet can be monitored and manipulated by intermediate entities in the data path from the source to the destination. For unencrypted communications (and some encrypted communications with known weaknesses), eavesdropping and man-in-the-middle attacks are possible. For encrypted communication, the identification of the communicating endpoints is still revealed. In addition, encrypted communications may be stored until such time as newly discovered weaknesses in the encryption algorithm or advances in computer hardware render them readable by attackers. In this work, we use public data to evaluate both advertised and observed routes through the Internet and measure the extent to which communications between pairs of countries are exposed to other countries. We use both physical router geolocation as well as the country of registration of the companies owning each router. We find a high level of information exposure; even physically adjacent countries use routes that involve many other countries. We also found that countries that are well `connected' tend to be more exposed. Our analysis indicates that there exists a tradeoff between robustness and information exposure in the current Internet.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/20/2019

Measuring Irregular Geographic Exposure on the Internet

In this work, we examine to what extent the Internet's routing infrastru...
research
10/12/2021

Quantifying Nations Exposure to Traffic Observation and Selective Tampering

Almost all popular Internet services are hosted in a select set of count...
research
02/01/2022

Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering

Most online communications rely on DNS to map domain names to their host...
research
06/19/2018

Few Throats to Choke: On the Current Structure of the Internet

The original design of the Internet was a resilient, distributed system,...
research
11/22/2018

PE-AONT: Partial Encryption combined with an All-or-Nothing Transform

In this report, we introduce PE-AONT: a novel algorithm for fast and sec...
research
05/18/2022

Using Internet Measurements to Map the 2022 Ukrainian Refugee Crisis

The conflict in Ukraine, starting in February 2022, began the largest re...
research
10/24/2022

Cybersecurity in the Smart Grid: Practitioners' Perspective

The Smart Grid (SG) is a cornerstone of modern society, providing the en...

Please sign up or login with your details

Forgot password? Click here to reset